Skip to main content

Security Bulletin

Filter by:

RISK: High Risk

High Risk

Adobe Flash Player Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Flash Player, which could be exploited by remote attackers to compromise a vulnerable system. These issues are caused by input validation errors, memory corruptions, and integer overflow errors when processing malformed Flash content, which could...
Last Update Date: 16 Feb 2011 Release Date: 10 Feb 2011 5238 Views

RISK: High Risk

High Risk

Microsoft Windows SMB "mrxsmb.sys" Remote Heap Overflow Vulnerability

A vulnerability has been identified in Microsoft Windows, which could be exploited by remote attackers to cause a denial of service or take complete control of a vulnerable system. This issue is caused by a heap overflow error in the "BowserWriteErrorLogEntry()" function within...
Last Update Date: 16 Feb 2011 17:01 Release Date: 16 Feb 2011 6059 Views

RISK: High Risk

High Risk

VMware Products Code Execution and Security Bypass Vulnerabilities

Multiple vulnerabilities have been identified in various VMware products, which could be exploited by attackers or malicious users to bypass security restrictions, gain knowledge of certain information, cause a denial of service or execute arbitrary code. These issues are caused by errors in...
Last Update Date: 16 Feb 2011 Release Date: 14 Feb 2011 5742 Views

RISK: Medium Risk

Medium Risk

Novell iPrint Server LPD Code Execution Vulnerability

A vulnerability has been identified in Novell iPrint for Linux Open Enterprise Server, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a buffer overflow error in LPD when processing malformed data, which could be exploited...
Last Update Date: 11 Feb 2011 17:46 Release Date: 11 Feb 2011 5558 Views

RISK: Medium Risk

Medium Risk

HP-UX CDE Calendar Manager Buffer Overflow Vulnerability

A vulnerability has been identified in HP-UX, which could be exploited by remote attackers to take complete control of a vulnerable system. This issue is caused by a buffer overflow error in the CMSD server (rpc.cmsd) within the CDE Calendar Manager when...
Last Update Date: 11 Feb 2011 17:41 Release Date: 11 Feb 2011 5779 Views

RISK: High Risk

High Risk

Google Chrome Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Google Chrome, which could be exploited by remote attackers to cause a denial of service or execute arbitrary code. Due to a stale pointer related to animation event handling, which could allow code execution.Due to a use...
Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 5419 Views

RISK: High Risk

High Risk

RealPlayer Predictable Temporary File Cross Domain Scripting Vulnerability

A vulnerability has been identified in RealPlayer, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error within the temporary file naming scheme used by the application to store references to RM files, which could...
Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 5423 Views

RISK: High Risk

High Risk

Adobe Acrobat and Reader Multiple Vulnerabilities

Multiple vulnerabilities have been identified in Adobe Acrobat and Reader, which could be exploited by malicious users to gain elevated privileges, or by remote attackers to gain knowledge of sensitive information or compromise a vulnerable system. These issues are caused by insecure permissions...
Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 5351 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows LSASS Length Validation Vulnerability( 09 February 2011 )

An elevation of privilege vulnerability exists in the way that the Microsoft Windows Local Security Authority Subsystem Service (LSASS) processes specially crafted authentication requests. The vulnerability could allow an attacker to run code with elevated privileges. An attacker who successfully exploited this vulnerability...
Last Update Date: 11 Feb 2011 Release Date: 9 Feb 2011 4754 Views

RISK: Medium Risk

Medium Risk

Microsoft Windows Kerberos Multiple Vulnerabilities( 09 February 2011 )

Kerberos Unkeyed Checksum Vulnerability An elevation of privilege vulnerability exists in implementations of Kerberos. The vulnerability exists because the Microsoft Kerberos implementation supports a weak hashing mechanism, which can allow for certain aspects of a Kerberos service ticket to be forged. A malicious ...
Last Update Date: 11 Feb 2011 Release Date: 9 Feb 2011 4910 Views